Backdoor Scanning for Deep Neural Networks through K-Arm Optimization. G Shen, Y Liu, G Tao, S An, Q Xu, S Cheng, S Ma, X Zhang ICML 2021, 2021 | 96 | 2021 |
Better trigger inversion optimization in backdoor scanning G Tao, G Shen, Y Liu, S An, Q Xu, S Ma, P Li, X Zhang Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2022 | 56 | 2022 |
Piccolo: Exposing complex backdoors in nlp transformer models Y Liu, G Shen, G Tao, S An, S Ma, X Zhang 2022 IEEE Symposium on Security and Privacy (SP), 2025-2042, 2022 | 51 | 2022 |
Complex backdoor detection by symmetric feature differencing Y Liu, G Shen, G Tao, Z Wang, S Ma, X Zhang Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2022 | 49* | 2022 |
Model orthogonalization: Class distance hardening in neural networks for better security G Tao, Y Liu, G Shen, Q Xu, S An, Z Zhang, X Zhang 2022 IEEE Symposium on Security and Privacy (SP), 1372-1389, 2022 | 42 | 2022 |
Flip: A provable defense framework for backdoor mitigation in federated learning K Zhang, G Tao, Q Xu, S Cheng, S An, Y Liu, S Feng, G Shen, PY Chen, ... arXiv preprint arXiv:2210.12873, 2022 | 31 | 2022 |
Mirror: Model inversion for deep learning network with high fidelity S An, G Tao, Q Xu, Y Liu, G Shen, Y Yao, J Xu, X Zhang Proceedings of the 29th Network and Distributed System Security Symposium, 2022 | 31 | 2022 |
Constrained optimization with dynamic bound-scaling for effective nlp backdoor defense G Shen, Y Liu, G Tao, Q Xu, Z Zhang, S An, S Ma, X Zhang International Conference on Machine Learning, 19879-19892, 2022 | 26 | 2022 |
Detecting backdoors in pre-trained encoders S Feng, G Tao, S Cheng, G Shen, X Xu, Y Liu, K Zhang, S Ma, X Zhang Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2023 | 22 | 2023 |
Penet: object detection using points estimation in aerial images Z Tang, X Liu, G Shen, B Yang arXiv preprint arXiv:2001.08247, 2020 | 19 | 2020 |
Brain tumor segmentation using concurrent fully convolutional networks and conditional random fields G Shen, Y Ding, T Lan, H Chen, Z Qin Proceedings of the 3rd International Conference on Multimedia and Image …, 2018 | 16 | 2018 |
Multi‐modal brain tumor image segmentation based on SDAE Y Ding, R Dong, T Lan, X Li, G Shen, H Chen, Z Qin International Journal of Imaging Systems and Technology 28 (1), 38-47, 2018 | 14 | 2018 |
Advspade: Realistic unrestricted attacks for semantic segmentation G Shen, C Mao, J Yang, B Ray arXiv preprint arXiv:1910.02354, 2019 | 12 | 2019 |
Backdoor vulnerabilities in normally trained deep learning models G Tao, Z Wang, S Cheng, S Ma, S An, Y Liu, G Shen, Z Zhang, Y Mao, ... arXiv preprint arXiv:2211.15929, 2022 | 11 | 2022 |
Beagle: Forensics of deep learning backdoor attack for better defense S Cheng, G Tao, Y Liu, S An, X Xu, S Feng, G Shen, K Zhang, Q Xu, S Ma, ... arXiv preprint arXiv:2301.06241, 2023 | 8 | 2023 |
Opening A Pandora's Box: Things You Should Know in the Era of Custom GPTs G Tao, S Cheng, Z Zhang, J Zhu, G Shen, X Zhang arXiv preprint arXiv:2401.00905, 2023 | 5 | 2023 |
Distribution preserving backdoor attack in self-supervised learning G Tao, Z Wang, S Feng, G Shen, S Ma, X Zhang 2024 IEEE Symposium on Security and Privacy (SP), 29-29, 2023 | 5 | 2023 |
Medic: Remove model backdoors via importance driven cloning Q Xu, G Tao, J Honorio, Y Liu, S An, G Shen, S Cheng, X Zhang Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2023 | 5 | 2023 |
On Large Language Models’ Resilience to Coercive Interrogation Z Zhang, G Shen, G Tao, S Cheng, X Zhang 2024 IEEE Symposium on Security and Privacy (SP), 252-252, 2024 | 4* | 2024 |
Elijah: Eliminating backdoors injected in diffusion models via distribution shift S An, SY Chou, K Zhang, Q Xu, G Tao, G Shen, S Cheng, S Ma, PY Chen, ... Proceedings of the AAAI Conference on Artificial Intelligence 38 (10), 10847 …, 2024 | 3 | 2024 |